首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36篇
  免费   1篇
  2020年   1篇
  2019年   2篇
  2018年   3篇
  2017年   3篇
  2016年   1篇
  2015年   1篇
  2014年   2篇
  2013年   17篇
  2007年   1篇
  2005年   1篇
  1996年   1篇
  1995年   1篇
  1992年   2篇
  1988年   1篇
排序方式: 共有37条查询结果,搜索用时 218 毫秒
21.
Recent tensions between Russia and the United States have sparked debate over the value of the North Atlantic Treaty Organization (NATO). One controversy surrounds the extent to which NATO raises the risk of war through entrapment—a concept that scholars invoke to describe how states might drag their allies into undesirable military conflicts. Yet scholars have advanced different, even conflicting arguments about how entrapment risks arise. I offer a typology that distinguishes between the mechanisms through which entrapment risks allegedly emerge on the basis of their institutional, systemic, reputational, and transnational ideological sources. I use the 2008 Russo-Georgian War to illustrate how the purported mechanisms of entrapment fare in elucidating that conflict. In analyzing why entrapment risks emerge, and thinking counterfactually about The 2008 War, I argue that scholars need to disentangle the various mechanisms that drive both alliance formation and war to make sure that entrapment risks do indeed exist.  相似文献   
22.
As the January 1968 Tet holiday approached, CIA analysts and American commanders in South Vietnam developed more accurate conclusions about communist military strategy than did intelligence analysts at CIA headquarters. Besides valuing different types of intelligence, General William Westmoreland, Lieutenant General Frederick Weyand, and CIA analysts in Saigon also placed greater emphasis on new information about communist military strategy than did CIA analysts at Langley. These different reactions to information highlight reasons why military commanders and intelligence analysts stationed in the theater of operations might develop more accurate conclusions about enemy military strategy than intelligence analysts stationed at their national headquarters.  相似文献   
23.
In January 2000, the Kashmir militancy is gaining ground and Indian forces are on the defensive. This is despite a decline in militancy from 1996 to mid‐1999. While India has managed to secure greater international support from the West, the failure of an elected state government in Kashmir to regain the confidence of Kashmiris has cost Delhi support. The militant revival is being driven by increasing professionalism, along with strong support from backers in Pakistan. Given there is now a 12‐year period of violence to analyse, new literature brings interesting insights.1  相似文献   
24.

New Zealand's current defence strategy, first expressed in NZ Government (1991), is one of "self-reliance in partnership". We outline the country's defence policy in historical context, examine its current defence expenditure and capabilities, and document the genesis of recent major changes in security policy. We pay particular attention to the role of explicit economic analysis and advice in the formation of these policy changes.  相似文献   
25.
The issue of guns or butter is one of the most fundamental economic questions, yet there is no consensus on a theoretical framework for examining it. Over the last decade, a version of a simple Keynesian macroeconomic model has been applied a number of times to examining the link between defence spending and economic growth in a range of countries. There are reasons for doubting the soundness of this model as a basis for empirical work.  相似文献   
26.
ABSTRACT

Researchers have recently proposed a new approach to nuclear-arms-control verification, dubbed “deferred verification.” The concept forgoes inspections at sensitive nuclear sites and of nuclear weapons or components in classified form. To implement this concept, a state first divides its nuclear program into a closed segment and an open segment. The total fissile-material inventory in the closed segment, which includes the weapon complex, is known and declared with very high accuracy. Essentially no inspections take place in the closed segment. In contrast, inspectors have access to the open segment, which includes in particular the civilian nuclear sector. The fissile-material inventory in the open segment is known with less accuracy, but uncertainties can be reduced over time using nuclear-archaeology methods. Deferred verification relies primarily on established safeguards techniques and avoids many unresolved verification challenges, such as the need for information barriers for warhead confirmation measurements. At the same time, deferred verification faces some unique challenges. Here, we explore some of these challenges and offer possible solutions; to do so, we examine possible noncompliance strategies in which a state would seek to withhold a higher-than-declared inventory.  相似文献   
27.
One of the achievements of scheduling theory is its contribution to practical applications in industrial settings. In particular, taking finiteness of the available production capacity explicitly into account, has been a major improvement of standard practice. Availability of raw materials, however, which is another important constraint in practice, has been largely disregarded in scheduling theory. This paper considers basic models for scheduling problems in contemporary manufacturing settings where raw material availability is of critical importance. We explore single scheduling machine problems, mostly with unit or all equal processing times, and Lmax and Cmax objectives. We present polynomial time algorithms, complexity and approximation results, and computational experiments. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
28.
This paper uses recently-released material from the ‘migrated archives’ to provide an original counterinsurgency analysis of the TNKU revolt in Brunei and Sarawak from December 1962 to May 1963. It argues that, despite a failure to act upon intelligence predicting the outbreak of insurgency, Britain developed a highly effective counterinsurgency organisation. These records also indicate that decision-makers drew inspiration from the Malayan Emergency to inform success in Brunei. Although Malaya has been challenged as a counterinsurgency paradigm, the Brunei operations show the utility of striking a balance between inappropriately copying from past campaigns and developing best practices applicable to the unique environment of Borneo. In turn, the evolution of effective operational practices in Brunei informed their successful application to the subsequent Indonesian Confrontation.  相似文献   
29.
30.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号